General

  • Target

    58e8383642bffde609ff436d8a580d5a_JaffaCakes118

  • Size

    60KB

  • Sample

    241018-w6zqpstern

  • MD5

    58e8383642bffde609ff436d8a580d5a

  • SHA1

    624d1764d2e80f2bd17521f5f1fa84c54752f01d

  • SHA256

    e288a90f416d1938d8bb7ea68a44d0c33213b12e5b217cbaf98a62903c1f4a6c

  • SHA512

    7116d760e3bd8c159111de0c9855968b26a7e4a1e59b66a2c65427cc1422e2b44a861c6a8923fb33e753469eafff13f98188f48bd9063e533c92e86fc2652235

  • SSDEEP

    768:HOucKn7n1JMDNANIUsDvLDwUzc80gmq3oP/oDt:HO2MDNAP4r/0O8/oB

Malware Config

Targets

    • Target

      58e8383642bffde609ff436d8a580d5a_JaffaCakes118

    • Size

      60KB

    • MD5

      58e8383642bffde609ff436d8a580d5a

    • SHA1

      624d1764d2e80f2bd17521f5f1fa84c54752f01d

    • SHA256

      e288a90f416d1938d8bb7ea68a44d0c33213b12e5b217cbaf98a62903c1f4a6c

    • SHA512

      7116d760e3bd8c159111de0c9855968b26a7e4a1e59b66a2c65427cc1422e2b44a861c6a8923fb33e753469eafff13f98188f48bd9063e533c92e86fc2652235

    • SSDEEP

      768:HOucKn7n1JMDNANIUsDvLDwUzc80gmq3oP/oDt:HO2MDNAP4r/0O8/oB

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (98) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks